SEMINARS

INFO

Aim

The training is aimed at technically prepared students. It focuses on the conceptual aspects of the topics listed in the 10 sessions above, and goes down to the technical aspects just enough to make sense of what is being explained. Each session can be complemented with a “hands on” class presented by another teacher, aiming to explore the theory just learned on a practical and technical level. For example trying cryptography on a computer rather than just relying on an explanation of it. “Hands on” classes can be applied to all 10 sessions or to a subset of consequent sessions.

Options

“compressed”, and last half day (4h),

“extended” and last a full day (4h + 4h).

Customised program options

Sessions can be mixed in format (example: 6 compressed and 4 extended)

Sessions can be held also during weekends or outside office hours

Class size

An ideal class has 10 (max15) students equally prepared.

PROGRAM

Session 1: Bitcoin Basics

What is Bitcoin
How Bitcoin is born, what problems needed to solve
What people can buy with bitcoin today
How consumers get started with Bitcoin
Is Bitcoin better or worse than cash?
Investigating crimes involving cash vs crimes involving bitcoin

Session 2: Peer-to-peer decentralised networks

Session 3: Cryptography

Basics of cryptography
Private and public keys
Digital identities and digital signatures
Offline encryption and encrypted data broadcasting
Shifting the paradigm of data access
What is homomorphic encryption
How LEOs should behave when meeting with encrypted data

Session 4: TOR and Onion Routing

TOR, what it is and how it works,
What services are running in the TOR network,
Bitcoin spent in the Dark Web,
Blockchain nodes in TOR,
Analysing data traffic in TOR networks,
Why LEAS should run TOR exit and entry nodes.

Session 5: Bitcoin Infrastructure

What is a blockchain,
Basic concepts on blockchain structure,
Different type of blockchains,
Various ways to access a blockchain,
Mining blocks vs forging blocks (PoW vs PoS),
Why blocks are valid timestamps,
Why LEAS should run blockchain nodes.

Session 6: The blockchain

Deep overview of a blockchain structure,
Combining a chain of data blocks with P2P networks, cryptography, and a TOR network,
Transaction structure and logic,
P2P broadcasting of a transaction,
Node transaction validation and majority consensus,
Smart contracts and phasing transactions,
Extracting logic of a blockchain pre-set deals during an investigation.

Session 7: Blockchain 2.0

What is a blockchain 2.0 and how it differs from the bitcoin one,
Covering tracks and keeping anonymity in Blockchain 2.0,
Benefits for the organised crime in using blockchain systems,
Example of crimes facilitated by a blockchain 2.0 system,
Reputation records, online personas, and digital identities,
Infiltrating a criminal organization in the blockchain.

Session 8: IoT + Blockchain (Blockchain 3.0)

Internet of Things and the Blockchain 3.0 overview,
Use of private keys (digital identities) in hardware devices,
Proof of existence of hardware generated data,
Examples of IoT solutions to monitor or trigger events,
Automated transactions triggered by IoT on the blockchain,
How organised crime can use IoT and Blockchain.

Session 9: Investigations involving a blockchain

What to look for during searches,
Difference between permanent data and data that change ownership,
How to collect blockchain related collateral data during an investigation,
Confiscating values (currencies, assets, tokens, etc),
Evaluating encrypted data and its metadata,
Data forensic when crypto is involved, best practices by a technical point of view,
More tips and tricks for LEAs when dealing with blockchain 2.0 investigations.

Session 10: Laboratory workshop

A look at Nxt (live),
Analysing the structure of a node,
Analysing the data held in a node DB,
Analysing the software component of a node,
Sniffing transaction packet data,
Other blockchain technical hints and tips for LEOs.

COMING SOON

COMING SOON

INFO

Aim

The training is aimed at technically prepared students. It focuses on the conceptual aspects of the topics listed in the 10 sessions above, and goes down to the technical aspects just enough to make sense of what is being explained. Each session can be complemented with a “hands on” class presented by another teacher, aiming to explore the theory just learned on a practical and technical level. For example trying cryptography on a computer rather than just relying on an explanation of it. “Hands on” classes can be applied to all 10 sessions or to a subset of consequent sessions.

Options

“compressed”, and last half day (4h),

“extended” and last a full day (4h + 4h).

Customised program options

Sessions can be mixed in format (example: 6 compressed and 4 extended)

Sessions can be held also during weekends or outside office hours

Class size

An ideal class has 10 (max15) students equally prepared.

PROGRAM

Session 1: Bitcoin Basics

What is Bitcoin
How Bitcoin is born, what problems needed to solve
What people can buy with bitcoin today
How consumers get started with Bitcoin
Is Bitcoin better or worse than cash?
Investigating crimes involving cash vs crimes involving bitcoin

Session 2: Peer-to-peer decentralised networks

Session 3: Cryptography

Basics of cryptography
Private and public keys
Digital identities and digital signatures
Offline encryption and encrypted data broadcasting
Shifting the paradigm of data access
What is homomorphic encryption
How LEOs should behave when meeting with encrypted data

Session 4: TOR and Onion Routing

TOR, what it is and how it works,
What services are running in the TOR network,
Bitcoin spent in the Dark Web,
Blockchain nodes in TOR,
Analysing data traffic in TOR networks,
Why LEAS should run TOR exit and entry nodes.

Session 5: Bitcoin Infrastructure

What is a blockchain,
Basic concepts on blockchain structure,
Different type of blockchains,
Various ways to access a blockchain,
Mining blocks vs forging blocks (PoW vs PoS),
Why blocks are valid timestamps,
Why LEAS should run blockchain nodes.

Session 6: The blockchain

Deep overview of a blockchain structure,
Combining a chain of data blocks with P2P networks, cryptography, and a TOR network,
Transaction structure and logic,
P2P broadcasting of a transaction,
Node transaction validation and majority consensus,
Smart contracts and phasing transactions,
Extracting logic of a blockchain pre-set deals during an investigation.

Session 7: Blockchain 2.0

What is a blockchain 2.0 and how it differs from the bitcoin one,
Covering tracks and keeping anonymity in Blockchain 2.0,
Benefits for the organised crime in using blockchain systems,
Example of crimes facilitated by a blockchain 2.0 system,
Reputation records, online personas, and digital identities,
Infiltrating a criminal organization in the blockchain.

Session 8: IoT + Blockchain (Blockchain 3.0)

Internet of Things and the Blockchain 3.0 overview,
Use of private keys (digital identities) in hardware devices,
Proof of existence of hardware generated data,
Examples of IoT solutions to monitor or trigger events,
Automated transactions triggered by IoT on the blockchain,
How organised crime can use IoT and Blockchain.

Session 9: Investigations involving a blockchain

What to look for during searches,
Difference between permanent data and data that change ownership,
How to collect blockchain related collateral data during an investigation,
Confiscating values (currencies, assets, tokens, etc),
Evaluating encrypted data and its metadata,
Data forensic when crypto is involved, best practices by a technical point of view,
More tips and tricks for LEAs when dealing with blockchain 2.0 investigations.

Session 10: Laboratory workshop

A look at Nxt (live),
Analysing the structure of a node,
Analysing the data held in a node DB,
Analysing the software component of a node,
Sniffing transaction packet data,
Other blockchain technical hints and tips for LEOs.